QUESTION 21 Hotspot Question You have an Exchange Server 2016 organization. The organization contains 5,000 mailboxes. All of the users in the organization share their Calendar with the users in two domains named contoso.com andfabrikam.com. You need to prevent the organization users from sharing their Calendar with the users in the contoso.com domain. What command should you run? To answer, select the appropriate options in the answer area.

Answer:

QUESTION 22 You have an Exchange Server 2016 organization. The organization contains five Mailbox servers. The servers are members of a database availability group (DAG). All of the databases in the DAG are replicated to all of the members. You plan to perform scheduled maintenance on a Mailbox server named MBX3 that will place the server offline for up to an hour. You need to ensure that any active databases on MBX3 are activated on other DAG members before performing the maintenance. Which cmdlet should you use?

QUESTION 23 You have an exchange server 2016 organization. The organization contains a Mailbox server named EX01. EX01 contains a mailbox database named DB01. The volume that contains DB01 fails. You need to perform a dial-tone recovery of the database. What should you create first?

A. a new Recovery Storage Group B. a new mailbox database C. a mailbox move request D. a mailbox restore request E. a lagged database copy

Answer: B

QUESTION 24 You have an Exchange Server 2016 organization. The organization contains several servers. Users in the marketing department often send Information Rights Management (IRM)- protected email messages. The IRM-protected messages are excluded from eDiscovery searches. You need to configure the Exchange Server Organization to ensure that the contents of the mailboxes of the marketing department users are searched for all messages that contain the word ProjectX. The solution must prevent the email messages from being deleted permanently. You user account is a member of the required role group. Which three actions should you perform? Each correct answer present part of the solution.

A. Run theNew-Mailboxcmdlet B. Run theNew-MailboxSearchcmdlet C. Run theSet-IRMConfigurationcmdlet D. RuntheSearch-Mailboxcmdlet E. Export the results from the discovery mailbox to a personal folders (PST) file, and then use MicrosoftOutlook to open the PST file. F. Use Outlook on the web to open the discovery mailbox.

QUESTION 25 Drag and Drop Question Your company has an Exchange Server 2016 organization. The organization contains three servers and 2,000 mailboxes. The organization audits all access to user mailboxes. The company’s security policy has the following requirements:

– Audit the name of each administrator who modifies the Exchange Server organization settings. – Reduce the amount of audit log information generated by a service account named Service!. – Create an audit entry when an administrator modifies the permissions of another administrative mailbox.

You need to identify which PowerShell cmdlets must be used to meet the requirements. Which PowerShell cmdlet should you identify for each requirement? To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once or not at all. You may need to drag the split bar between panes or scroll to view content.

Answer:

QUESTION 26 Your company has an Exchange Server 2016 organization. All users have a primary mailbox and archive mailboxes. You create a new retention policy for the users. The policy includes the following types of tags: A default retention policy tag (RPT) applied to the mailbox: The tag is configured to move email messages older than three years to the archive. An RPT applied to the users’ Sent Items folder: The tag is configured to move email messages older than one year to the archive. The corporate retention policy is applied to all of the mailboxes. A user creates a personal tag named Tag1. The personal tag is configured to delete items permanently after 180 days. The user sends an email message that uses Tag1. You need to identify what will occur to the message. What should you identify?

A. The message will be deleted in six months. B. The message will he moved to the archive in one year C. The message will be moved to the archive in one year and deleted six months later. D. The message will be moved to the archive in three years.

Answer: A Explanation: Personal tags allow your users to determine how long an item should be retained. For example, the mailbox can have a DPT to delete items in seven years, buta user can create an exception for items such as newsletters and automated notifications by applying a personal tag to delete them in three days. https://technet.microsoft.com/en-us/library/dd297955(v=exchg.150).aspx

QUESTION 27 Hotspot Question You deploy a server named ex01 .contoso.com that has Exchange Server 2016 installed. You need to ensure that when users connect to the URL of http://ex01.contoso.com. thev access Outlook on the web over a secure connection. How should you configure the Default Web Site? To answer, select appropriate options in the selected area.

Answer:

QUESTION 28 Your company has a data center. The data center contains a server that has Exchange Server 2016 and the Mailbox server role installed. Outlook anywhere clients connect to the Mailbox server by using the name outlook.contoso.com. The company plans to open a second data center and to provision a database availability group (DAG) that spans both data centers. You need to ensure that Outlook Anywhere clients can connect if one of the data centers becomes unavailable. What should you add to DNS?

A. one A record B. two TXT records C. two SRV records D. one MX record

QUESTION 29 Hotspot Question You have an Exchange Server 2016 organization named Contoso. You create an organization relationship with a partner’s Exchange Server organization named Fabrikam. The users in Fabrikam can view the free/busy information of all the users in Contoso. You need to ensure that the users in Fabrikam can view the custom Mail Tips configured in Contoso. What command should you run in Contoso? To answer select the appropriate options in the answer area

Answer:

QUESTION 30 Hotspot Question You have an exchange server 2016 organization. The organization contains two servers named EX01 and EX02. Both servers are members of a database availability group (DAG) named DAG01. DAG01 contains two mailbox databases named DB01 and DB02. DB01 and DB02 are replicated to all of the members of DAG01.

You run the Get-MailboxDatabaseCopyStatus cmdlet and you receive the following output. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the output.